His primary areas of study are Computer security, Cryptocurrency, Currency, Smart contract and Cryptography. His Computer security study combines topics in areas such as Scheme and Scalability. The study incorporates disciplines such as Database transaction, Database, Volume, Protocol and Anonymity in addition to Cryptocurrency.
His Anonymity research incorporates elements of Key management, Key, Electronic money and Internet privacy. His Smart contract research is multidisciplinary, incorporating perspectives in Virtual currency, Cryptographic protocol, Software deployment and Financial transaction. His studies deal with areas such as Electronic cash, Internet Protocol and Interoperability as well as Cryptography.
His main research concerns Cryptocurrency, Artificial intelligence, Computer security, Stereochemistry and Computer vision. In his research, Overhead is intimately related to Protocol, which falls under the overarching field of Cryptocurrency. His work on Image and Object detection as part of general Artificial intelligence research is frequently linked to Basketball, bridging the gap between disciplines.
When carried out as part of a general Computer security research project, his work on Blockchain and Cryptography is frequently linked to work in Service provider, therefore connecting diverse disciplines of study. His Cryptography research is multidisciplinary, incorporating elements of Programming language and Theoretical computer science. Andrew Miller has included themes like Platelet-activating factor, Alkyl and Metalloproteinase in his Stereochemistry study.
His primary areas of investigation include Artificial intelligence, Computer security, Cryptocurrency, Machine learning and Cryptography. His research in the fields of Pattern recognition overlaps with other disciplines such as Inductive bias. The various areas that Andrew Miller examines in his Computer security study include Network topology and Scalability.
He performs integrative study on Cryptocurrency and Lightning. His Machine learning study incorporates themes from Probabilistic logic and Food seeking. Andrew Miller focuses mostly in the field of Cryptography, narrowing it down to topics relating to Process calculus and, in certain cases, Provable security.
Cryptocurrency, Computer security, Database transaction, Network topology and Robustness are his primary areas of study. The concepts of his Cryptocurrency study are interwoven with issues in Construct, Payment and State. His research integrates issues of Scalability and Communication channel in his study of Computer security.
He combines subjects such as Scheme, Overlay network, Network measurement and Upload with his study of Database transaction. His Network topology study integrates concerns from other disciplines, such as Exploit and Node. The Robustness study combines topics in areas such as Computation, Cloud computing, Computer network, Abort and Implementation.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba;Andrew Miller;Elaine Shi;Zikai Wen.
ieee symposium on security and privacy (2016)
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba;Andrew Miller;Elaine Shi;Zikai Wen.
ieee symposium on security and privacy (2016)
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan;Joseph Bonneau;Edward Felten;Andrew Miller.
(2016)
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan;Joseph Bonneau;Edward Felten;Andrew Miller.
(2016)
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau;Joseph Bonneau;Joseph Bonneau;Andrew Miller;Jeremy Clark;Arvind Narayanan.
ieee symposium on security and privacy (2015)
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau;Joseph Bonneau;Joseph Bonneau;Andrew Miller;Jeremy Clark;Arvind Narayanan.
ieee symposium on security and privacy (2015)
On Scaling Decentralized Blockchains
Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)
On Scaling Decentralized Blockchains
Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)
VizWiz: nearly real-time answers to visual questions
Jeffrey P. Bigham;Chandrika Jayant;Hanjie Ji;Greg Little.
conference on web accessibility (2010)
VizWiz: nearly real-time answers to visual questions
Jeffrey P. Bigham;Chandrika Jayant;Hanjie Ji;Greg Little.
conference on web accessibility (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Princeton University
Carnegie Mellon University
Cornell University
Princeton University
University of Central Florida
New York University
University of Central Florida
Stanford University
Columbia University
ETH Zurich
University of Edinburgh
Tsinghua University
University of Science and Technology Beijing
University of the Ryukyus
Kyoto University
University of Arkansas at Fayetteville
University of Electronic Science and Technology of China
Indira Gandhi Centre for Atomic Research
Antoni van Leeuwenhoek Hospital
Pacific Biosciences (United States)
University of Strasbourg
Catholic University of the Sacred Heart
Dalhousie University
Oak Ridge Associated Universities
New York Medical College
Harvard University